Data Protection — News
The Information Commissioner's Office (ICO) has found a school in Hampshire in breach of the Data Protection Act (DPA) after the personal details of nearly 20,000 people were put at risk when the school's website was hacked.
A Taiwanese political party suspects the Chinese government is behind a hacking attack that stole information about the party's election activities.
Cloud computing seems simple in concept, and indeed, simplicity of operation, deployment and licensing are its most appealing assets. But when it comes to questions of compliance, once you scratch the surface you'll find more questions than you asked in the first place, and more to think about than ever before.
Optus has been awarded PCI DSS compliance for its Business SmartPay system, making it the first telco to achieve such a status in Australia and New Zealand.
The volume of email containing polymorphic malware -- malicious software that can change its characteristics to evade detection by anti-virus defences -- has increased dramatically, according to security vendor Symantec.
In what appears to be a ramp-up of celebrity support, famous graphic novel author Alan Moore Monday issued a statement in praise of PFC Bradley Manning. Manning is the G.I. accused of leaking classified U.S. government documents to WikiLeaks.
At the Defcon conference in Las Vegas last week, kids aged 8 to 16 were exposed to the world of hacking. Some may fear indoctrinating a new generation of Anonymous and LulzSec members, but young minds can expand the horizons of technology and computer security to effectively combat hacking collectives such as these.
EMC has squirrelled away US$81.3 million in reserve to cover the cost of customer remediation in response to the attack on RSA’s SecurID system it revealed in March.
A 10-year-old California hacker just figured out what a bunch of developers apparently couldn't: How to hack various mobile phone and tablet based games by simply fiddling with the clock. And she just told all at the first annual DefCon Kids hacker conference—a subset of DEFCON, the self-identified "world's longest running and largest underground hacking conference"—which wrapped yesterday in Las Vegas.
Leading US critical infrastructure security consultant Eric Byres has slammed security practices at Siemens following the demonstration of serious security vulnerabilities in their S7 programmable logic controllers (PLCs) at Black Hat 2011.
Unsatisfied with stealing bank account information from their victims, cybercriminals steal frequent flyer miles, too. The miles are used as currency among some of the miscreants, according to a report released today by the malware fighters at the Kaspersky Lab.
After the hacking gang Anonymous took credit for defacing Syria's Ministry of Defense website, a Syrian group today retaliated by posting gruesome photos on Anonymous' embryonic social network.
Cisco has admitted to sending customers warranty CDs that, when opened in a browser, took users to a website know to have hosted malware.
LAS VEGAS -- Anonymous has run up quite a score against corporations, governments and law enforcement agencies, but for all these warnings corporate executives are turning their heads from the real problem -- their network security is terrible, a panel of experts concluded at Defcon.
Freedom and privacy, in any meaningful sense, are dead. I know, I know ... I've written about this topic before but that was in the context of our "factual" privacy, which is about access to what you might think of as "static" data about you. Now we have to recognize the death of our "realtime" or "lifestream" privacy: the freedom to go about our business unobserved and anonymously.
The South Australian government has recorded a decrease in crime levels, thanks to its updated Crime Mapper website.
While still not great, the operating systems behind Apple desktops, laptops and phones are getting more secure, researchers at Black Hat say.While not recommended for corporate use unless it’s in islands within larger networks, the OSX operating system has made strides, says Alex Stamos, who lead a team of researchers from iSec Partners that researched the OSX and Windows 7 operating systems.
To prevent online privacy breaches Australia needs a privacy watchdog rather than merely guidelines, a law lecturer has argued.
For all the talk of Cloud computing, the governance issue remains, for many enterprises, the great unknown. Cloud computing inevitably impacts business processes, making governance vital to managing risk and adapting to take advantage of new opportunities.
Sign up now »
Manage the complete audit lifecycle from audit universe identification and risk assessment to management/board reporting and quality assurance.
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.